Tracking Unauthorized Access Using Machine Learning and PCA for Face Recognition Developments

被引:2
作者
Pavaloaia, Vasile-Daniel [1 ]
Husac, George [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Fac Econ & Business Adm, Dept Accounting Business Informat Syst & Stat, Iasi 700506, Romania
关键词
face detection; machine learning algorithms; principal component analysis; AdaBoost; 3D; EXPRESSION; IMAGE;
D O I
10.3390/info14010025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last two decades there has been obtained tremendous improvements in the field of artificial intelligence (AI) especially in the sector of face/facial recognition (FR). Over the years, the world obtained remarkable progress in the technology that enhanced the face detection techniques use on common PCs and smartphones. Moreover, the steadily progress of programming languages, libraries, frameworks, and tools combined with the great passion of developers and researchers worldwide contribute substantially to open-source AI materials that produced machine learning (ML) algorithms available to any scholar with the will to build the software of tomorrow. The study aims to analyze the specialized literature starting from the first prototype delivered by Cambridge University until the most recent discoveries in FR. The purpose is to identify the most proficient algorithms, and the existing gap in the specialized literature. The research builds a FR application based on simplicity and efficiency of code that facilitates a person's face detection using a real time photo and validate the access by querying a given database. The paper brings contribution to the field throughout the literature review analysis as well as by the customized code in Phyton, using ML with Principal Component Analysis (PCA), AdaBoost and MySQL for a myriad of application's development in a variety of domains.
引用
收藏
页数:19
相关论文
共 59 条
  • [1] 2D and 3D face recognition: A survey
    Abate, Andrea F.
    Nappi, Michele
    Riccio, Daniel
    Sabatino, Gabriele
    [J]. PATTERN RECOGNITION LETTERS, 2007, 28 (14) : 1885 - 1906
  • [2] An Efficient Network Intrusion Detection and Classification System
    Ahmad, Iftikhar
    Ul Haq, Qazi Emad
    Imran, Muhammad
    Alassafi, Madini O.
    AlGhamdi, Rayed A.
    [J]. MATHEMATICS, 2022, 10 (03)
  • [3] AT&T Laboratories, CAMBR DAT FAC
  • [4] Bazama A, 2021, ALQALAM J MED APPL S, V4, P58
  • [5] Analysis of various optimizers on deep convolutional neural network model in the application of hyperspectral remote sensing image classification
    Bera, Somenath
    Shrivastava, Vimal K.
    [J]. INTERNATIONAL JOURNAL OF REMOTE SENSING, 2020, 41 (07) : 2664 - 2683
  • [6] Automatic 3D face authentication
    Beumier, C
    Acheroy, M
    [J]. IMAGE AND VISION COMPUTING, 2000, 18 (04) : 315 - 321
  • [7] Bing H., 2014, OPEN CYBERN SYST J, V8, P183, DOI [10.2174/1874110X01408010183, DOI 10.2174/1874110X01408010183]
  • [8] Bowyer K.W., 2004, P INT C PATTERN RECO
  • [9] A survey of approaches and challenges in 3D and multi-modal 3D+2D face recognition
    Bowyer, KW
    Chang, K
    Flynn, P
    [J]. COMPUTER VISION AND IMAGE UNDERSTANDING, 2006, 101 (01) : 1 - 15
  • [10] Bronstein AM, 2003, LECT NOTES COMPUT SC, V2688, P62